regula
« Back to VersTracker
Description:
Checks infrastructure as code templates using Open Policy Agent/Rego
Type: Formula  |  Latest Version: 3.2.1@0  |  Tracked Since: Oct 28, 2025
Links: Homepage  |  formulae.brew.sh
Category: Devops
Tags: security iac compliance devsecops opa cloud
Install: brew install regula
About:
Regula is a command-line tool that validates Infrastructure as Code (IaC) templates—like Terraform, CloudFormation, and Kubernetes manifests—against security, compliance, and best practice policies written in Rego. It leverages the Open Policy Agent (OPA) engine to provide fast, customizable policy evaluation directly in the development pipeline. Its main value is enabling 'shift-left' security by catching misconfigurations before deployment.
Key Features:
  • Evaluates Terraform, CloudFormation, and Kubernetes configurations
  • Uses Open Policy Agent (OPA) and Rego for policy definition
  • Includes a library of pre-built rules for compliance standards (e.g., CIS, AWS Foundational Security Best Practices)
  • Integrates into CI/CD pipelines and local development workflows
  • Provides detailed, human-readable reports of policy violations
Use Cases:
  • Pre-commit and CI/CD security scanning for Infrastructure as Code
  • Enforcing organizational compliance and security baselines across cloud deployments
  • Educating developers on cloud security best practices during development
Alternatives:
  • checkov – Checkov is a similar IaC scanner but uses a Python-based policy language, whereas Regula uses OPA/Rego for greater policy flexibility and reuse.
  • tfsec – tfsec is specialized for Terraform and uses static analysis, while Regula is multi-format and uses the OPA policy engine.
Version History
Detected Version Rev Change Commit
Dec 27, 2025 5:17pm 3.2.1 0 VERSION_BUMP 1e009c08
Oct 28, 2025 10:43pm 0 VERSION_BUMP 72ce6170
Nov 10, 2024 3:04pm 0 VERSION_BUMP 2c836248
Sep 14, 2024 1:16am 0 VERSION_BUMP c3fe6124